0% found this document useful (0 votes)
23 views18 pages

Analyst M8 U4

This document outlines the EU's approach to cybersecurity and digital intelligence, emphasizing the importance of cyber threat intelligence (CTI) in combating cyber threats and misinformation. It details key EU cybersecurity frameworks such as the NIS Directive and GDPR, and the role of ENISA in coordinating responses to cyber incidents. Additionally, it discusses strategies for countering disinformation and hybrid threats, highlighting the need for coordinated action among EU member states.

Uploaded by

Lisapolla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views18 pages

Analyst M8 U4

This document outlines the EU's approach to cybersecurity and digital intelligence, emphasizing the importance of cyber threat intelligence (CTI) in combating cyber threats and misinformation. It details key EU cybersecurity frameworks such as the NIS Directive and GDPR, and the role of ENISA in coordinating responses to cyber incidents. Additionally, it discusses strategies for countering disinformation and hybrid threats, highlighting the need for coordinated action among EU member states.

Uploaded by

Lisapolla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

EU GOVERNANCE IN

INTELLIGENCE
MASSIVE OPEN ONLINE COURSE (MOOC)
Project N. 2023-1-IT02-KA220-HED-000161770
ANALYST - A New Advanced Level for Your Specialised Training
UNIT 4: CYBERSECURITY AND
DIGITAL INTELLIGENCE IN THE EU

Table of contents
Unit Overview
Part 1: The Digital Transformation of Intelligence
This unit looks at how the EU gathers and uses digital The evolution of cyber intelligence and digital
security strategies.
intelligence to fight cyber threats, misinformation, and
The role of intelligence in detecting and
protect online spaces. preventing cyber threats.
Part 2: EU Cybersecurity Policies and Frameworks
Overview of the NIS Directive, GDPR, and
Learning Outcomes
Digital Services Act.
The role of ENISA (European Union Agency for
After this unit, learners will be able to:
Cybersecurity).
Understand the impact of digital transformation on
Part 3: Cyber Threat Intelligence (CTI) in the EU
intelligence.
Intelligence techniques used to track
Identify major EU cybersecurity frameworks (NIS cybercriminal networks.
Directive, GDPR, DSA). Case study: EU response to large-scale
Explain ENISA’s role in cybersecurity coordination. cyberattacks.
Describe how cyber threat intelligence (CTI) supports Part 4: Countering Disinformation and Hybrid
EU defenses. Threats
Analyze intelligence strategies against disinformation Intelligence responses to digital propaganda
and hybrid threats. and state-sponsored cyber operations.
Tools used to combat misinformation within EU
member states.
The Digital Transformation of Intelligence

What is Cyber Intelligence?


Cyber intelligence refers to the collection and analysis of data from digital environments to
detect and respond to threats. It is used by governments, companies, and EU agencies to
anticipate attacks, understand threat actors, and protect key assets. This intelligence goes
beyond raw data - it includes understanding motivations, timing, and impact, often with the
support of machine learning or behavioural analytics.
In the EU context, cyber intelligence is central to risk assessments and policy planning across
sectors such as energy, transport, health, and defence.

For more information on Cyber Threats, visit the website of the European
Union Agency for Cybersecurity
The Digital Transformation of Intelligence

From Traditional Intelligence to Digital Intelligence

Traditional intelligence relied on human sources and physical surveillance

Digital intelligence uses data from networks, devices, and online platforms

Analysts now combine both types to understand complex threats

Automation and AI have increased the scale and speed of threat detection

EU security strategy relies on digital tools to monitor cybercrime and hybrid threats
The Digital Transformation of Intelligence

How Intelligence Prevents Cyber Threats


As cyber threats become more sophisticated, the ability to detect early signals is critical.
Digital intelligence helps by identifying vulnerabilities before they are exploited.

Prevention in practice includes:


Flagging anomalies like repeated login failures or unexpected traffic
Using threat intelligence feeds to spot known malware
Coordinating with EU agencies to share risk alerts across borders
Responding faster than attackers can move
EU Cybersecurity Policies and Frameworks

NIS Directive – Focus on Threat Preparedness

The NIS2 Directive is not just policy — it shapes how intelligence is used in real time.
Key intelligence-related impacts:
Requires operators (like energy grids and transport hubs) to report incidents
within 24 hours
Improves early warning systems between member states
Promotes real-time risk analysis and information exchange
New in NIS2:
Coverage extends to public administrations, space, and food sectors
Sets minimum requirements for incident response capabilities
EU Cybersecurity Policies and Frameworks

GDPR in Digital Intelligence – Rights vs. Risks


GDPR protects personal data but what happens when that data becomes part of an
investigation?
What intelligence professionals must balance:
Profiling: Only allowed under strict conditions — affects use of automated threat
detection
Anonymisation: Raw data must be stripped of identifiers when used in training AI models
Purpose limitation: Intelligence can’t be reused for unrelated investigations
Practical example: A cybersecurity platform can flag suspicious behaviour, but sharing
personal info with law enforcement still needs a legal basis.
For details check the EDPB Website
EU Cybersecurity Policies and Frameworks

The Role of the European Union Agency for Cybersecurity - ENISA


ENISA is the EU’s cybersecurity agency, based in Athens. It serves as a central point for
expertise, training, and incident coordination. ENISA supports both national governments
and EU institutions in preparing for and responding to cyber threats. Its annual Threat
Landscape Report is a key source for analysts across Europe.
ENISA also runs large-scale exercises like Cyber Europe, where simulated attacks test the
resilience of national systems.

For more on ENISA’s cybersecurity role, training, and EU-wide


coordination, visit: www.enisa.europa.eu
Cyber Threat Intelligence in the EU

What is Cyber Threat Intelligence (CTI)?


Cyber Threat Intelligence (CTI) provides structured insights into cyber threats at different
levels, helping organisations detect, understand, and respond to attacks more effectively.

Strategic CTI Trends and big-picture threats for senior decision-makers

Operational CTI Technical patterns and context around specific threats

Tactical CTI Detailed indicators like malware hashes or phishing domains

CTI Feeds Automated streams from trusted providers (e.g. CERT-EU, ENISA)

Purpose Enables preemptive action and more targeted defences


Cyber Threat Intelligence in the EU

CTI in Action – Tracking Threats

A practical CTI workflow might begin with collecting data from honeypots, threat
reports, or leaked criminal chat logs.
Analysts match that data with recent activity seen on EU networks. They may identify a
phishing campaign targeting hospitals, for example. With this information, they notify
other EU countries through platforms like SIENA.

The entire cycle - from collection to response - can take just hours when coordination
works well.
EU Cybersecurity Policies and Frameworks

Case Study – EU Response to SolarWinds Hack


The 2020 SolarWinds hack was a significant supply chain attack compromising the Orion
software platform. While primarily impacting US entities, some EU-based organizations were
indirectly affected. The incident underscored vulnerabilities in global IT supply chains.
The EU response included:
Strengthening supply chain cybersecurity guidance
Enhancing coordination among EU CSIRTs
Expanding cross-sector threat intelligence sharing

Read more about the SolarWinds incident and other major supply chain
attacks in ENISA’s Threat Landscape for Supply Chain Attacks report
Countering Disinformation and Hybrid Threats

Understanding Hybrid Threats

Hybrid threats blend different tactics to destabilize societies without open conflict.
• Combine cyberattacks, disinformation, and political manipulation
• Commonly used by states or groups acting on their behalf
• Target trust in institutions, critical infrastructure, and democratic processes
• Often hard to trace or respond to under current laws and systems
• Seen in election interference, vaccine misinformation, and fake advocacy groups

Read more about how NATO defines and responds to hybrid threats:
Countering hybrid threats
Countering Disinformation and Hybrid Threats

Tools to Counter Disinformation


The EU uses several tools to counter disinformation, including fact-checking platforms, AI-
driven monitoring systems, and a rapid alert network for emerging threats. One of the best-
known efforts is EUvsDisinfo, which tracks and exposes state-backed narratives through
public reporting.
The European Digital Media Observatory (EDMO) supports a network of national fact-
checking hubs and research centers across member states. The Rapid Alert System enables
swift coordination between EU institutions and countries in response to disinformation
threats. Other initiatives help detect coordinated campaigns involving bots and trolls. These
efforts are designed to promote transparency while upholding legal protections for free
expression.
Countering Disinformation and Hybrid Threats

Intelligence vs Disinformation - A Comparison


This table compares how intelligence gathering and disinformation campaigns operate:

Focus Intelligence Disinformation


Area Gathering Campaigns
Goal Understand and respond to threats Influence or manipulate public opinion

Tools Data analysis, threat modelling Fake news, deepfakes, fake accounts

Source State agencies, experts Often state-linked or criminal

Detection Legal and technical coordination Harder due to rapid spread and design

Risk Data misuse or overreach Societal division and mistrust


Intelligence in EU Security Policy
HOW THE EU FIGHTS HYBRID THREATS
Hybrid threats are increasingly used to exploit the vulnerabilities of open societies without
triggering traditional military responses. Understanding how to build resilience against these
tactics is essential for European security.
Watch this video where Dr. Teija
Tiilikainen, Director of the Hybrid CoE,
highlights how hybrid threats evolve, the
tools used to counter them, and why
coordinated action between states and
societies is key to defending democracy.
Unit 4: Activity

Scenario:
Imagine you are advising the EU Commission’s crisis unit. A major disinformation
campaign has spread false claims about a new health crisis and is trending across
multiple platforms.

Your task: Write a short plan (5–7 points) outlining how digital intelligence could
help respond.
Consider:
What data would you collect first?
Which agencies would you coordinate with?
How would you verify sources?
What platforms might be targeted?
How would you counter the campaign publicly?
Unit 4: Self-Assessment

What is one key function of ENISA?


A) Launching police investigations
B) Monitoring private social media use
C) Coordinating EU-wide cybersecurity training
D) Overseeing national laws on privacy

What is the EUvsDisinfo project primarily designed to do?


A) Monitor cybersecurity vulnerabilities in critical infrastructure
B) Detect and analyse online propaganda and disinformation
C) Develop AI-based surveillance systems
D) Regulate encryption software for law enforcement
THANK YOU FOR
YOUR ATTENTION
MASSIVE OPEN ONLINE COURSE (MOOC)
Project N. 2023-1-IT02-KA220-HED-000161770
ANALYST - A New Advanced Level for Your Specialised Training

You might also like